2. CYBER PRIVACY
• Internet privacy is the privacy and security level of personal data published via the
internet.
• In the broad term that refers to a variety of factors, techniques and technologies
used to protect sensitive and private data communication,and preferences.
• Internet privacy and anonymity are paramount to users, especially as e- commerce
continues to gain traction. Privacy violations and threat risks are standard
consideration for any website under development.
• Internet privacy is also known as online privacy.
3. • Cyber privacy is mostly defined by the service used individuals.
Whatever agreements individuals agree to when they sign up
for a service usually signs away their right to privacy.
• In other words cases their reasonable expectation of privacy is
not reasonable if the behaviour or communication in questions
were knowingly exposed to public view.
4. CRIMES INVOLVING CYBER PRIVACY
Cyber privacy is a huge concern for civilians and
especially for companies because of the potential for crime.cyber crime
is ignorance of cyber privacy ,and cyber privacy is protected to cyber
crime.
The Cyber crimes are included;
• Malware- such as the use of malicious code which can compromise a
user’s identity and or information.
• Denial of service attacks- block a user from accessing his or her
information.
• Computer Virus- can compromise user information as well as
identity.
5. All of these crimes fall under the category or fraud,identity
theft, phishing scams or information warfare
The cyber privacy project attempt to rise public awareness
and promote the education of cyber privacy to prevent crime from happening.
. There has been an increase in cyber privacy related crimes
since 2001 when the internet was being used widespread across the country.
7. CYBER TERRORISM
Cyber terrorism is defined as an act of terrorism
committed through the use of cyberspace or computer resources.As
such a simple propaganda in the internet, that there will be bomb
attacks during the holidays can be constructed as an act of
cyberterrorisum .At its height,cyberterrorists may use the internet or
computer resources to carryout an actual attack .As wellas there are
also backing activities directed towards individuals, families, organised
by groups within networks tending to cause fear among people,
demonstrate power collecting information relevant for ruining peoples
lives ,robberies , black mailing etc……